International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

An Elliptic Curve Processor Suitable For RFID-Tags

Authors:
L. Batina
J. Guajardo
T. Kerins
N. Mentens
P. Tuyls
I. Verbauwhede
Download:
URL: http://eprint.iacr.org/2006/227
Search ePrint
Search Google
Abstract: RFID-Tags are small devices used for identification purposes in many applications nowadays. It is expected that they will enable many new applications and link the physical and the virtual world in the near future. Since the processing power of these devices is low, they are often in the line of fire when their security and privacy is concerned. It is widely believed that devices with such constrained resources can not carry out sufficient cryptographic operations to guarantee security in new applications. In this paper, we show that identification of RFID-Tags can reach high security levels. In particular, we show how secure identification protocols based on the DL problem on elliptic curves are implemented on a constrained device such as an RFID-Tag requiring between 8500 and 14000 gates, depending on the implementation characteristics. We investigate the case of elliptic curves over $F_{2^p}$ with p prime and over composite fields $F_{2^{2p}}$. The implementations in this paper make RFID-Tags suitable for anti-counterfeiting purposes even in the off-line setting.
BibTeX
@misc{eprint-2006-21720,
  title={An Elliptic Curve Processor Suitable For RFID-Tags},
  booktitle={IACR Eprint archive},
  keywords={implementation / RFID, counterfeiting, authentication, ECC, small area implementations},
  url={http://eprint.iacr.org/2006/227},
  note={ Jorge.Guajardo@philips.com 13333 received 4 Jul 2006},
  author={L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede},
  year=2006
}